heroui logo

Trap Signals Execution

Elastic Detection Rules

View Source
Summary
The 'Trap Signals Execution' rule is designed to detect unauthorized executions of the 'trap' command, which is often used in Unix-like operating systems, including Linux and macOS. This command allows users to specify actions to take upon receiving various interrupt signals, making it a potential target for malicious actors looking to execute unwanted commands during the execution flow. By monitoring for processes where the event type is 'start' and the action indicates command execution (such as exec or process_started), this rule serves as a proactive measure against privilege escalation attempts associated with event-triggered executions. It leverages the Elastic Stack data sources including logs from endpoint events and auditd manager logs to identify such threat indicators, helping maintain system integrity and security.
Categories
  • Endpoint
  • Linux
  • macOS
Data Sources
  • User Account
  • Process
  • Application Log
  • Network Traffic
  • Kernel
ATT&CK Techniques
  • T1546
  • T1546.005
Created: 2023-08-24